From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Selective Redundancy Removal: A Framework for Data Hiding.. Future Internet, 2 (1): 30-40 (2010)Automated detection and containment of worms and viruses into heterogeneous networks: a simple network immune system., и . Int. J. Wirel. Mob. Comput., 2 (1): 47-58 (2007)A Low Cost and Effective Link Protection Approach for Enhanced Survivability in Optical Transport Networks., и . ISPA Workshops, том 4331 из Lecture Notes in Computer Science, стр. 368-376. Springer, (2006)Energy-Oriented Models for WDM Networks., , , , , и . BROADNETS, том 66 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 534-548. Springer, (2010)An Enhanced Firewall Scheme for Dynamic and Adaptive Containment of Emerging Security Threats., , , и . BWCCA, стр. 475-481. IEEE Computer Society, (2010)Introducing MPLS in Mobile Data Networks: An High Performance Framework for QoS-Powered IP Mobility., и . MATA, том 2881 из Lecture Notes in Computer Science, стр. 142-155. Springer, (2003)Evaluating energy savings in WoL-enabled networks of PCs., , , , и . ISIE, стр. 1-6. IEEE, (2013)Digital farming based on a smart and user-friendly IoT irrigation system: A conifer nursery case study., , , , , и . IET Cyper-Phys. Syst.: Theory & Appl., 9 (2): 150-168 (июня 2024)Optimal fitness aware cloud service composition using modified invasive weed optimization., , и . Swarm Evol. Comput., (2019)Containing large-scale worm spreading in the Internet by cooperative distribution of traffic filtering policies., и . Comput. Secur., 27 (1-2): 48-62 (2008)